United States v. Adjani

CourtCourt of Appeals for the Ninth Circuit
DecidedJuly 10, 2006
Docket05-50092
StatusPublished

This text of United States v. Adjani (United States v. Adjani) is published on Counsel Stack Legal Research, covering Court of Appeals for the Ninth Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Adjani, (9th Cir. 2006).

Opinion

FOR PUBLICATION UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT

UNITED STATES OF AMERICA,  No. 05-50092 Plaintiff-Appellant, D.C. No. v.  CR-04-00199-TJH- CHRISTOPHER LEE ADJANI; JANA 01 REINHOLD, OPINION Defendants-Appellees.  Appeal from the United States District Court for the Central District of California Terry J. Hatter, Chief District Judge, Presiding

Argued and Submitted January 13, 2006—Pasadena, California

Filed July 11, 2006

Before: Mary M. Schroeder, Chief Judge, Daniel M. Friedman* and Raymond C. Fisher, Circuit Judges.

Opinion by Judge Fisher

*The Honorable Daniel M. Friedman, Senior United States Circuit Judge for the Federal Circuit, sitting by designation.

7577 UNITED STATES v. ADJANI 7581

COUNSEL

Elyssa Getreu, Assistant United States Attorney, Los Angeles, California, for the plaintiff-appellant.

Marilyn E. Bednarski, Kaye, McLane & Bednarski, LLP, Pas- adena, California, for defendant-appellee Jana Reinhold.

OPINION

FISHER, Circuit Judge:

While executing a search warrant at the home of defendant Christopher Adjani to obtain evidence of his alleged extor- tion, agents from the Federal Bureau of Investigation seized Adjani’s computer and external storage devices, which were later searched at an FBI computer lab. They also seized and subsequently searched a computer belonging to defendant Jana Reinhold, who lived with Adjani, even though she had not at that point been identified as a suspect and was not named as a target in the warrant. Some of the emails found on Reinhold’s computer chronicled conversations between her and Adjani that implicated her in the extortion plot. Relying in part on the incriminating emails, the government charged both Adjani and Reinhold with conspiring to commit extor- tion in violation of 18 U.S.C. § 371 and transmitting a threat- ening communication with intent to extort in violation of 18 U.S.C. § 875(d).

The defendants brought motions to suppress the emails, arguing that the warrant did not authorize the seizure and search of Reinhold’s computer and its contents; but if it did, 7582 UNITED STATES v. ADJANI the warrant was unconstitutionally overbroad or, alternatively, the emails fell outside the scope of the warrant. The district court granted the defendants’ motion to suppress the email communications between Reinhold and Adjani, finding that the agents did not have sufficient probable cause to search Reinhold’s computer, and that once they discovered informa- tion incriminating her, the agents should have obtained an additional search warrant. The government appeals this evi- dentiary ruling, but only with respect to three emails dated January 12, 2004.

The district court’s ruling on the motion to suppress is sub- ject to de novo review. United States v. Vargas-Castillo, 329 F.3d 715, 722 (9th Cir. 2003). We review de novo a district court’s determination regarding the specificity of a warrant, including whether it is overbroad or not sufficiently particu- lar. United States v. Wong, 334 F.3d 831, 836-37 (9th Cir. 2003). We hold that the government had probable cause to search Reinhold’s computer, the warrant satisfied our test for specificity and the seized e-mail communications fell within the scope of the properly issued warrant.1 Accordingly, we reverse the district court’s order suppressing the January 12, 2004 email communications between Reinhold and Adjani.

I. Background

A. The Extortion Scheme2 1 The FBI agents engaged in multiple searches and seizures here. First, FBI agents searched Adjani’s residence. During the course of this search, the agents seized Reinhold’s and Adjani’s computers. Then, at the FBI computer lab, agents searched Reinhold’s computer for evidence of the alleged extortion. Finally, the agents seized the three e-mails forming the basis of this appeal. For purposes of our analysis, however, we collapse the first three events into one, generally referring to it as the “search” of Reinhold’s computer. As for the last event, we refer to it as the “seizure” of e-mail communications. 2 The following factual summary is based entirely on the FBI affidavit presented to, and relied upon by, the magistrate judge in support of the FBI’s request for an arrest warrant for Adjani and a search warrant for var- ious premises. UNITED STATES v. ADJANI 7583 Adjani was once employed by Paycom Billing Services Inc. (formerly Epoch), which facilitates payments from Inter- net users to its client websites. As a payment facilitator, Pay- com receives and stores vast amounts of data containing credit card information. On January 8, 2004, a woman (later identified as Reinhold) delivered envelopes to three Paycom partners, Christopher Mallick, Clay Andrews and Joel Hall. Each envelope contained a letter from Adjani advising that he had purchased a copy of Paycom’s database containing its cli- ents’ sensitive financial information. The letter threatened that Adjani would sell the Paycom database and master client con- trol list if he did not receive $3 million. To prove his threats were real, Adjani included samples of the classified data. He directed the Paycom partners to sign an enclosed agreement attesting to the proposed quid pro quo and fax it back to him by January 12. The letter included Adjani’s email address, cadjani@mac.com, and a fax number. Agents later learned that Adjani’s email address was billed to Reinhold’s account.

Evidence suggested that Adjani left Los Angeles on Janu- ary 9, 2004, and ultimately ended up in Zurich, Switzerland. From Switzerland, Adjani sent an email on January 12 to Joel Hall to confirm that Hall and the others had received the envelopes. Adjani followed up on this email on January 13 by instructing Hall to contact him through AOL/Mac iChat instant messaging if he wanted to discuss the settlement agreement. With the FBI monitoring, Hall conversed several times with Adjani on the Internet and over the telephone. In spite of Adjani’s insistence that he remain overseas, Hall con- vinced him to come to Los Angeles on January 26 to pick up $2.5 million in exchange for the database.

Adjani returned to Los Angeles on January 22, under FBI surveillance. Reinhold, driving in a car that the FBI had ear- lier identified as Adjani’s, was observed leaving Adjani’s res- idence in Venice, California, picking him up from the airport and returning to his residence. The FBI also observed Rein- 7584 UNITED STATES v. ADJANI hold using an Apple computer, the same brand of computer Adjani used to email and chat with Paycom.

B. Obtaining and Executing the Search Warrant

On January 23, 2004, based on the facts recited above and attested to in FBI Agent Cloney’s affidavit (which was affixed to the warrant), a federal magistrate judge granted the government an arrest warrant for Adjani and a search warrant covering Adjani’s Venice residence, his vehicle, his person and the residence of the individual who had stolen the confi- dential information from Paycom. The warrant specifically sought “evidence of violations of [18 U.S.C. § 875(d)]: Trans- mitting Threatening Communications With Intent to Commit Extortion.” Further, the warrant expressly authorized seizure of:

5g. Records, documents and materials containing Paycom’s or Epoch’s master client control docu- ments, Paycom’s or Epoch’s email database, or other company information relating to Paycom or Epoch.

5h.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Olmstead v. United States
277 U.S. 438 (Supreme Court, 1928)
Brinegar v. United States
338 U.S. 160 (Supreme Court, 1949)
Andresen v. Maryland
427 U.S. 463 (Supreme Court, 1976)
Zurcher v. Stanford Daily
436 U.S. 547 (Supreme Court, 1978)
Steagald v. United States
451 U.S. 204 (Supreme Court, 1981)
United States v. Ross
456 U.S. 798 (Supreme Court, 1982)
Illinois v. Gates
462 U.S. 213 (Supreme Court, 1983)
Illinois v. Rodriguez
497 U.S. 177 (Supreme Court, 1990)
United States v. James Francis Melvin
596 F.2d 492 (First Circuit, 1979)
United States v. Maurice Abrams
615 F.2d 541 (First Circuit, 1980)
United States v. Leigh Raymond Tamura
694 F.2d 591 (Ninth Circuit, 1982)
United States v. Tehfe
722 F.2d 1114 (Third Circuit, 1983)
United States v. Harlan Peacock and Harold Peacock
761 F.2d 1313 (Ninth Circuit, 1985)

Cite This Page — Counsel Stack

Bluebook (online)
United States v. Adjani, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-adjani-ca9-2006.